Resubmissions

09-11-2024 16:52

241109-vdwb5sxlft 10

09-11-2024 16:52

241109-vdf78ayblg 10

Analysis

  • max time kernel
    62s
  • max time network
    71s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-11-2024 16:52

General

  • Target

    main.exe

  • Size

    17.9MB

  • MD5

    5d946f2799896858663f4c846d6049c8

  • SHA1

    995c45f635cc16985c51b463a38658b2cfcc0d30

  • SHA256

    fddd05ac4f54a75f145e8bef8e0379df4954aa3d2808e7a41bca01c20854047b

  • SHA512

    dcd411bfcc15c183141d6d3b281282b7633ee1dbc254d0187a7d127c432053dcbd79f4b9cc937b7cba736c115a91c17ed82d16f3269ec33eaef371147be40fc7

  • SSDEEP

    393216:hqPnLFXlrzQMDOETgsvfGKQgeoavEOp1rzEu2uqo:IPLFXNzQREAfozQ9EHo

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:1
    1⤵
      PID:2644
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:1
      1⤵
        PID:2684
      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
        1⤵
          PID:1852
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1536 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:2
          1⤵
            PID:1912
          • C:\Users\Admin\AppData\Local\Temp\main.exe
            "C:\Users\Admin\AppData\Local\Temp\main.exe"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1252
            • C:\Users\Admin\AppData\Local\Temp\main.exe
              "C:\Users\Admin\AppData\Local\Temp\main.exe"
              2⤵
              • Loads dropped DLL
              PID:1036
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --mojo-platform-channel-handle=3200 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:1
            1⤵
              PID:1372
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3324 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:8
              1⤵
                PID:772
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3432 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:8
                1⤵
                  PID:1800
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:8
                  1⤵
                    PID:2096
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=3748 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:1
                    1⤵
                      PID:1032
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2468 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:8
                      1⤵
                        PID:1556
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=1228,i,7036603442594178252,9647105752089881875,131072 /prefetch:8
                        1⤵
                          PID:332
                        • C:\Windows\explorer.exe
                          "C:\Windows\explorer.exe"
                          1⤵
                            PID:1796

                          Network

                          MITRE ATT&CK Matrix

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\_MEI12522\python310.dll

                            Filesize

                            1.4MB

                            MD5

                            69d4f13fbaeee9b551c2d9a4a94d4458

                            SHA1

                            69540d8dfc0ee299a7ff6585018c7db0662aa629

                            SHA256

                            801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046

                            SHA512

                            8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378

                          • memory/1036-114-0x000007FEF4690000-0x000007FEF4AFE000-memory.dmp

                            Filesize

                            4.4MB